← Industry Guides
Consumer ElectronicsCRA Guide

EU Cyber Resilience Act Guide for Smart Home Device Manufacturers

Default Class for simple connected accessories; Important Class I for smart locks, home security systems, and hub devices

Smart home device manufacturers producing connected doorbells, smart locks, home automation hubs, security cameras, smart plugs, and similar IoT products for the EU market must comply with the EU Cyber Resilience Act by September 2026. Smart home products present some of the most common cybersecurity vulnerabilities found in consumer IoT — default credentials, unencrypted cloud communications, and absent update mechanisms — which the CRA directly targets.

Article 13Article 14Annex IArticle 10Annex IVArticle 20
Deadline: September 2026Classification: Default Class for simple connected accessories; Important Class I for smart locks, home security systems, and hub devices

CRA Scope and Classification for Smart Home Products

Smart home products with network connectivity and embedded software — smart plugs, bulbs, thermostats, doorbells, smart locks, home automation hubs, and security camera systems — are products with digital elements within CRA scope. Product classification depends on the device's function and data processing capabilities.

Default Class applies to simple connected accessories with limited data processing — a smart plug that enables remote power switching with no biometric data collection may be Default Class. Important Class I applies to devices that provide physical access control (smart locks), process audio or video inside the home (security cameras with cloud recording), or function as a network hub controlling other devices. Smart home hub devices that integrate with multiple third-party products and control home access or safety systems should be assessed as Class I. Manufacturers must document their classification rationale for each product SKU in the technical file.

CRA reference:Article 6, Annex III

Key Technical Security Requirements for Smart Home Devices

Smart home devices have historically been among the most poorly secured connected products, with default credentials, unencrypted communications, and absent update mechanisms being widespread. CRA Annex I Part I directly targets these systemic weaknesses:

  • Unique or no default credentials: Each device must either use a unique factory-assigned credential or require the user to set credentials at first use. Shared default passwords (e.g., admin/admin) are prohibited.
  • Encrypted communications: All communications between the device, companion app, and cloud backend must be encrypted using current TLS standards. Local network discovery protocols must not expose sensitive device data.
  • Automatic security updates: Smart home devices must support and enable by default automatic security updates. The update mechanism must be authenticated and tamper-resistant.
  • Minimal data collection: Devices must not collect data beyond what is necessary for device function. Camera and audio data must be protected against unauthorised access.
  • End-of-life communication: When a device reaches end of support, the manufacturer must notify users and must not disable security functionality in a way that leaves devices vulnerable.
CRA reference:Annex I

CVD Policy and Article 13 for Smart Home Brands

Most smart home device manufacturers — particularly smaller brands and white-label manufacturers — currently lack a formal CVD policy. Security researchers routinely discover vulnerabilities in smart home products that go unreported or unacknowledged for months because no submission channel exists.

  • Publishing a security.txt file at the brand domain (e.g., https://brand.com/.well-known/security.txt)
  • Providing a submission channel accessible to non-technical users and researchers alike
  • Responding to reports within a defined timeframe (best practice: 5 business days)
  • Committing to security update publication and customer notification for resolved vulnerabilities

Brands operating under private-label or OEM arrangements must clarify which entity bears the Article 13 CVD obligation. If the brand places the product on the EU market under its own brand name, it is the manufacturer for CRA purposes, regardless of the actual hardware manufacturer. CVD Portal's intake and triage tools enable brands without dedicated security teams to manage this obligation operationally.

CRA reference:Article 13(1), Article 13(6)

Article 14 Incident Reporting for Smart Home Products

Smart home vulnerabilities attract significant attention from both security researchers and threat actors due to the privacy implications of compromised home cameras, locks, and microphones. Article 14 requires manufacturers to notify ENISA within 24 hours of becoming aware of active exploitation of a product vulnerability.

  • Unauthorised remote access to device cloud accounts at scale
  • Malware campaigns targeting the device (e.g., Mirai-variant infections)
  • Researcher or law enforcement reports of active exploitation in the wild

The 24-hour ENISA notification must confirm the product and nature of the exploitation. The 72-hour detailed report provides technical content; the 30-day final report confirms remediation. For consumer-facing smart home products, manufacturer communication must also include direct customer notification through app push notifications and email — passive advisory publication is insufficient given that consumers may not check security advisory pages.

CRA reference:Article 14(1), Article 14(2)

Conformity Assessment and Supply Chain Obligations

Default Class smart home products may use the internal conformity assessment procedure (Module A under Annex VIII). Class I products require third-party assessment. For brands relying on ODM/OEM manufacturers in Asia, the conformity assessment obligation sits with the EU market placer — the brand.

  1. Obtain security documentation from the ODM/OEM that supports the Annex I technical assessment
  2. Verify that the ODM's software stack meets CRA requirements or commission modifications
  3. Maintain an SBOM for the product that reflects the actual components used
  4. Ensure that post-sale update mechanisms are under the brand's control, not solely the ODM's

This creates a commercial pressure to restructure ODM relationships: brands must have contractual rights to require security patches, SBOM updates, and vulnerability notifications from their hardware suppliers throughout the product's supported lifetime. Sourcing from ODMs who are not CRA-ready will create ongoing compliance liability for EU-market brands.

CRA reference:Article 24, Annex IV

CVD Portal handles your CRA Article 13 obligations automatically.

Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for Smart Home Device Manufacturers.

Start your free portal

Frequently asked

Are smart home products from non-EU manufacturers subject to the CRA?+

Yes. The CRA applies to all products with digital elements placed on the EU market, regardless of where the manufacturer is located. Non-EU manufacturers who sell directly to EU customers — through their own websites or through EU-based marketplaces — must comply with the CRA. If a non-EU manufacturer uses an EU-based importer or authorised representative to place products on the market, those entities may take on manufacturer-equivalent CRA obligations. EU-based marketplace operators may also face obligations to remove non-compliant products from their platforms under the CRA's market surveillance provisions.

What happens when we discontinue a smart home product — do CRA obligations end?+

No. CRA obligations persist throughout the product's declared supported lifetime, even if the product is discontinued. If you stop selling a smart home hub but have declared a 3-year support period, you must continue to monitor for vulnerabilities, issue security patches, and maintain the CVD policy for that product for the full 3-year period from the last date of sale. You may not unilaterally shorten the declared supported lifetime after sale. This means manufacturers must carefully consider support cost obligations before declaring supported lifetimes, and must price products accordingly.

Can we use a shared CVD policy that covers all our smart home products?+

Yes. A single CVD policy can cover all products with digital elements placed by a manufacturer, provided the policy clearly states the scope and all products are covered. Article 13 does not require per-product CVD policies — it requires that a policy exists and is publicly accessible. A well-structured policy covering your entire product portfolio is both compliant and more operationally manageable than per-product policies. The policy should list major product categories in scope and should be linked from every product's support page and from the `security.txt` file.

Need a CVD policy template for Smart Home Device Manufacturers?

Download a free CRA-compliant vulnerability disclosure policy and deploy it in minutes.

Browse templates →